Google

«   2024/05   »
1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31
BLOG Total Visitors
Today Hit, Yesterday Hit
BLOG main image


visitor stats
'분류 전체보기'에 해당되는 글 167건
[Schizo!, 2008. 12. 7. 13:56, 취미생활/game]

'취미생활 > game' 카테고리의 다른 글

GTA4 팁  (0) 2008.12.08
GTA4 하마치 멀티 방법  (1) 2008.12.07
GTA4 창모드, fsaa 사용과 그래픽 옵션 제한 간단하게 풀기  (4) 2008.12.07
GTA4 치트키  (0) 2008.12.06
레드일럿 한글 패치 개선판입니다.  (1) 2008.10.31


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 12. 7. 00:11, 취미생활/game]
★그래픽 옵션 제한 풀기

1. 게임이 설치된 폴더에 commandline.txt 파일을 생성.

2. commandline.txt 내용에 -norestrictions라고 입력.

3. 게임을 실행하여 옵션을 조절.

★창모드

commandline.txt 내용에 -windowed


★fsaa 사용(이 옵션의 실효성에 대해서는 아직 말이 많음) // 안되는듯합니다.

commandline.txt 내용에 /fsaa 입력


★종합

셋 다 하려면 commandline.txt에
-norestrictions
-windowed
/fsaa

입력

'취미생활 > game' 카테고리의 다른 글

GTA4 하마치 멀티 방법  (1) 2008.12.07
GTA4 미션 공략 사이트  (0) 2008.12.07
GTA4 치트키  (0) 2008.12.06
레드일럿 한글 패치 개선판입니다.  (1) 2008.10.31
바이오쇼크 vista 소리 안나시는 분들,  (7) 2008.08.16


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 12. 6. 09:27, 취미생활/game]
사용자 삽입 이미지


초반 It's Your Call 미션 후
십자키의 윗부분을 두번 터치하여 번호를 입력하고 샌드부분 터치하시면 실행.


359-555-0100 : 경찰헬기 소환

227-555-0100 : FIB (FBI가 타는 검고 큰 지프차) 자동차 소환

227-555-0142 : Cognoscenti (차체가 긴 고급차) 자동차 소환

227-555-0175 : Comet 자동차 소환

227-555-0168 : Spuer GT (경주용 스포츠카) 자동차 소환

227-555-0147 : Turismo (스포츠카) 자동차 소환

625-555-0150 : Sanchez (산악용오토바이) 바이크 소환

625-555-0100 : NRG-900 바이크 소환

938-555-0100 : Jet MAX 보트 소환

326-555-0100 : 방탄복 100%충전

482-555-0100 : 체력 100%충전

486-555-0150 : 무기세트1 야구배트,권총,샷건(산탄총),MP-10(머신건),M4(머신건),스나이퍼총,RPG(로켓런쳐),수류탄

486-555-0100 : 무기세트2 칼,화염병,권총,샷건(산탄총),Uzi(머신건),AK47,스나이퍼총,RPG(로켓런쳐)

486-555-0100 : 날씨바꾸기

267-555-0150 : 지명수배 레벨 올리기

267-555-0100 : 지명수배 레벨 내리기

Song information(치트 적용시 핸드폰으로 노래정보와 아티스트 정보를 문자로보내줌)
GTA4안에서 나오는 노래 정보. 948-555-0100.


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 11. 28. 20:01, 정보]
어느덧 벌써 연말이군요.
대인배 오프라 윈프리 누님께서 크리스마스 캐럴 8곡을 쏩니다.
아마 내일까지 무료로 알고 있습니다.

http://www.oprah.com/article/oprahshow/20081118_tows_holiday/2

'정보' 카테고리의 다른 글

  (26) 2013.06.15
imaginary foundation  (0) 2009.04.23
프로그램 녹화 서비스 TIVIR  (0) 2008.11.28
모토로라 zn40  (0) 2008.11.27
바이러스  (0) 2008.11.12


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 11. 28. 09:27, 정보]
http://www.tivir.com/ 회원 가입후 TV수신료 납부 영수증을 스캔이나 디카로 찍어서 제출. 다른 자동녹화서비스에 비해 화질이 좋고, (720p까지 선택가능) 다른 곳은 유료인데 반해  무료라는게 장점

'정보' 카테고리의 다른 글

imaginary foundation  (0) 2009.04.23
크리스마스 캐럴송 8곡 무료  (2) 2008.11.28
모토로라 zn40  (0) 2008.11.27
바이러스  (0) 2008.11.12
HJE300  (0) 2008.11.11


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 11. 27. 02:23, 정보]


우연히 봤는데(테스트폰인듯)
찾아보니 크레이브 zn40 이라고 합니다.
dmb가 되는 듯 하고, 이뻤음!
저 투명한 커버에 달린 모토로라 엠블럼에서 소리가 나오는지 궁금함

'정보' 카테고리의 다른 글

크리스마스 캐럴송 8곡 무료  (2) 2008.11.28
프로그램 녹화 서비스 TIVIR  (0) 2008.11.28
바이러스  (0) 2008.11.12
HJE300  (0) 2008.11.11
접속 차단  (0) 2008.08.27


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 11. 22. 22:38, study/ccna]
ccna 2 final

Why would an administrator change the value highlighted in the exhibit? (Choose two.)

-to make the router bypass the startup-configuration file

-to configure the router to boot the RXBOOT image 

During initial router bootup the following line appears:
"NVRAM invalid, possibly due to write erase."
What are two possible reasons for this result? (Choose two.)

-The router has not been configured.

-The startup-config file cannot be located. 

A new technician must add boot system commands to one of the department routers. Which available commands will the router return as output when the command shown below is entered? (Choose two.)
Router(config)# boot system ?

-TFTP

-FLASH 

What information can be learned during the initial router bootup? (Choose two.)

-the number and types of interfaces installed

-the router model and the amount of memory that is available 

Which of the following are primary functions of a router? (Choose two.)

-packet switching

-Path selection 


What can be determined from the output shown in the exhibit? (Choose two.)

-Montgomery has Layer 2 connectivity with Cumberland.

-Brant, Fisherman, and Potomac are directly connected to Montgomery. 

Which router components and operations are correctly described? (Choose two.)

NVRAM - stores the configuration file

POST - runs diagnostics on hardware modules 

What are the results of setting the boot field bits in the configuration register to "0000"? (Choose two.)

-The router will enter ROM monitor mode upon reload.

Which commands will correctly configure an extended ACL? (Choose two.)

-Router(config)# access-list 192 permit icmp host 198.18.4.3 172.22.0.255 0.0.0.0 echo

-Router(config)# access-list 153 deny udp 10.43.0.0 0.0.255.255 any eq 161 

Which commands will show the status and IP address of all interfaces on a router? (Choose two.)

-show protocols

-show interfaces 

An administrator needs to determine if RIP v1 or IGRP should be used in a small network. Which two statements are true and should be considered by the administrator before making the decision? (Choose two.)

-IGRP will use the available bandwidth and calculated traffic delays on the link to help determine the best path.

-IGRP can be implemented on large networks up to 255 hops in diameter. 

Which of the following statements are true regarding routed protocols? (Choose two.)

-They provide enough information in the Layer 3 address to allow a packet to be forwarded from one network to another.

-They carry user data between networks. 

Which two steps describe how to create a functional physical connection between a router console and a terminal? (Choose two.)

-Use an RJ-45 to DB-9 adapter on the terminal serial port to connect to the cable going to the router console.

-Use a rollover cable to connect from a terminal serial port to the router console port. 

What are two possible reasons a router would not load a valid IOS from flash? (Choose two.)

-The first boot system command executed in the startup configuration file is boot system rom.

-The configuration register is set to 0x2100. 

access-list 199 deny tcp 198.18.0.0 0.0.255.255 any eq 25
access-list 199 permit ip any any
 
Assuming this ACL is correctly applied to a router interface, which statements describe traffic on the network? (Choose two.)

-SMTP traffic from hosts on network 198.18.0.0 will be denied.

-SMTP and HTTP traffic to hosts on the 198.18.0.0 network is permitted. 


What can be concluded from the set of commands shown in the exhibit? (Choose two.)

-This is a named extended ACL that allows any host on 192.168.85.0 to Telnet to address 172.25.0.26.

-All FTP and HTTP traffic destined for 172.25.0.26 will be denied. 


Neither router in the graphic has a host table or DNS available. The interfaces and passwords have been correctly configured. Which of the following commands will initiate a Telnet session? (Choose two.)

-ATL# 192.168.4.2

-CHI# telnet 192.168.4.1 

From the running-config, the following configuration entries are displayed:
Router(config)# line vty 0 2 
Router(config-line)# password g8k33pr 
Router(config-line)# login 
What can be interpreted from the exhibited configuration? (Choose two.)

-Three Telnet lines are available for remote access.

-Remote access to this local router will require a Telnet password of g8k33pr. 

What are two characteristics of the support for Telnet within Cisco IOS software? (Choose two.)

-Up to five separate Telnet lines are supported by default in standard edition IOS files.

-A router can host simultaneous Telnet sessions. 

What are two recommended uses of login banners? (Choose two.)

-to display security warning messages

-to announce a scheduled system shutdown

Which features describe a FastEthernet interface on a router? (Choose two.)

-may be administratively disabled by using the shutdown command

-must be configured with a valid IP address and subnet mask in order to forward packets 

What will occur if the command service password-encryption is entered on a router? (Choose two).

-It will apply a weak encryption to all unencrypted passwords.

-It will configure the user EXEC mode, telnet, and enable passwords as encrypted. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Choose 3 

Which procedures will work while configuring the router using the setup configuration utility? (Choose three.)

-Press Enter or the Return key to accept the default values.

-Enter the address on an interface or add a new routing protocol suite.

-Press Ctrl-C to return to the privileged mode prompt or to terminate setup mode. 


Which devices can be used to convert the data from a WAN router at the customer site into a form acceptable for use by the WAN service provider? (Choose three.)

-modem

-DCE device

-CSU/DSU 


Refer to the exhibit. Communication is needed between the Marketing LAN and the Sales LAN. All hosts on those LANs also need connectivity to the Internet. Which three commands will allow this communication? (Choose three).

-Marketing(config)# ip route 0.0.0.0 0.0.0.0 fa0/0

-Sales(config)# ip route 192.0.2.0 255.255.255.0 fa0/0

-Sales(config)# ip route 0.0.0.0 0.0.0.0 s0/0 


What can be determined from the output shown in the exhibit? (Choose three.)

-The version for this IOS file is 12.1 release 5.

-Where the file is stored on the router and whether the file is relocatable is indicated by the expression mz.

-This image could be used on a 2621 or a 2620 with enough RAM. 

What are three features of CDP? (Choose three.)

-provides information on directly connected devices that have CDP enabled

-tests Layer 2 connectivity

-enabled by default on each interface 

The following access list has been correctly applied to a router interface:
access-list 52 deny 172.30.65.52
access-list 52 permit any
 
Which of the following statements are true about this ACL? (Choose three.)

-A wildcard mask of 0.0.0.0 is assumed for 172.30.65.52.

-All traffic from 172.30.65.51 will be permitted.

-This is a standard IP access list. 

Why are interface descriptions used in router configurations? (Choose three).

-to enable support personnel to easily identify networks and customers that may    be affected by a possible interface issue

-to provide comments on the interface without affecting the router functionality

-to identify the purpose and location of the interface 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Single answer

In what order will the initial startup routine of a router locate and load the IOS if the config-register setting is 0x2102 and there are no boot system commands present in the startup-config file?

-Flash, TFTP server, ROM 


The Marshall and Fiji routers have been correctly configured to use RIP v1 as a dynamic routing protocol, and all interfaces on the Marshall and Fiji routers are reporting "interface is up, line protocol is up" status. RIP v1 is then configured on the Chatham router using the following commands:  
Chatham(config)# router rip 
Chatham(config-router)# network 198.18.100.0 
Chatham(config-router)# network 172.23.0.0 
If no additional routing is configured on Chatham, Marshall, or Fiji, what will be the result?

-Networks 198.18.100.0/24 and 172.23.0.0/16 will be unreachable from Marshall and Fiji. 
 


Router A is directly connected to the networks shown in the graphic and has a default route that points to Router B. All interfaces are active and properly addressed. However, when the workstation on network 172.16.4.0/24 sends a packet to destination address 172.16.201.5, it is discarded by Router A. What can be a reason for this result?

-The ip classless command is not enabled on Router A. 


A network administrator has enabled RIP on routers A and B in the network diagram. Which commands will prevent RIP v1 updates from being sent to Router C?

-B(config)# router rip 
B(config-router)# passive-interface S0/1
 

Which router component stores the information that is displayed by the show arp command?

-RAM 

If a PC does not have network connectivity to a router, which router port can be used to establish communication?

-Console 

What can a network administrator do to recover from a lost router password?

-boot the router to ROM monitor mode and configure the router to ignore NVRAM when it initializes 
 


 
 
The following access list has been created to prevent traffic from host 172.23.40.36 from accessing the 192.168.34.0 network.
access-list 44 deny host 172.23.40.36
access-list 44 permit any
 
Refer to the graphic. Which group of commands will properly place the access list so that the host is denied access only to network 192.168.34.0?

-Tokyo(config)# interface fa0/0 
Tokyo(config-if)# ip access-group 44 out
 

A network administrator must configure a FastEthernet interface with an IP address. The configuration must also identify the remote site to which the interface is connected. Which set of commands will meet these requirements?

-StPetersburg(config)# interface fa0/0 
StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252 
StPetersburg(config-if)# description San Jose T1
 

A network administrator issues the erase startup-config command on a configured router with the configuration register set to 0x2102 and observes the following output:
Erasing the nvram filesystem will remove all files! Continue? [Confirm]
[OK]
Erase of nvram: complete
If the router unexpectedly loses power after this sequence, what will occur when power is restored?

-The router will prompt the user to enter setup mode or to continue without entering setup mode. 

The main router of XYZ company has enough flash and RAM to store multiple IOS images. An administrator wants to upload a second IOS image from a TFTP server to the flash of the router. Which method will accomplish this task?

-Copy the IOS image file from a TFTP server using the command copy tftp flash. When prompted, provide the IP address or name of the TFTP server and the IOS image filename. 


Refer to the exhibit. While planning an IOS upgrade, the administrator issues the command show version. What is the current IOS boot location?

-ROM 


Refer to the graphic. Which command will create a standard ACL that will apply to outbound traffic on interface Fa0/0 of router A and will deny IP traffic from any host on network 172.16.34.0/24 that is destined for network 192.168.5.0/24 while allowing all other IP traffic?

-access-list 33 deny 172.16.34.0 0.0.0.255
access-list 33 permit any
 


Refer to the exhibit. Router C interface E0 has gone down. What is the maximum time that will elapse before Router A learns that network 110.90.1.0 is down?

-5 seconds


 
Refer to the exhibit. Which set of commands will configure static routes that will allow the WinterPark and the Altamonte routers to deliver packets from each LAN and direct all other traffic to the Internet?

-WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1 
Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2 
Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/1


Which ACL can be applied in the outbound direction of Serial 0/0 on router B in the graphic to allow all IP traffic from LAN A to the Internet, allow Web traffic from LAN B to the Internet, and deny all other traffic to the Internet?

-access-list 125 permit ip 192.168.2.0 0.0.0.255 any 
access-list 125 permit tcp 10.90.3.0 0.0.0.255 any eq www


 
What will occur when the following ACL is applied inbound to both FastEthernet interfaces of the Anaheim Router shown in the exhibit?
access-list 166 permit icmp 10.128.114.0 0.0.0.255 10.97.88.0 0.0.0.255 echo 
access-list 166 permit icmp 10.97.88.0 0.0.0.255 10.128.114.0 0.0.0.255 echo 
access-list 166 permit tcp 10.128.114.0 0.0.0.255 any eq www

-The Finance Admin host and the HR Admin host will be able to ping to each other. The HR Admin host will be allowed to access Web servers on the Internet, while the Finance Admin host will be denied Internet Web access.


 
Refer to the graphic. A network administrator has a console connection to Router A. Pings to Router B are successful, but pings to Routers C and D fail. What is the first step in troubleshooting the problem?

-Use the show interfaces command from a Telnet session on router B to check the connection to router C. 


Refer to the graphic. Assuming default metrics are used and the network is fully converged, which path will the IGRP routing protocol use to send a packet from Router A to Router F?

-A, B, D, E, F 

What can be determined from this output?  
I 192.0.2.0/24 [100/57625] via 198.18.243.21, 00:00:12, Serial0/1

-57625 is a composite metric used by IGRP in calculating the best path. 

'study > ccna' 카테고리의 다른 글

CCNA 2 - Module 11 Exam  (0) 2008.11.08
CCNA 2 - Module 10 Exam  (0) 2008.10.28
CCNA 2 - Module 9 Exam  (0) 2008.10.28
CCNA 2 - Module 8 Exam  (0) 2008.10.25
CCNA 2 - Module 7 Exam  (0) 2008.10.25


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 11. 19. 00:52, 취미생활/아이팟터치]

한곳은 애플에 의해 폐쇄되었고..나머지 한곳 마져 접속이 안되네요...
근데 폐쇄된 시점이...2nd 해킹하는 팀에서 2nd 해킹이 어렵다는 말이 나온 직후임..
아놔...누가 그랬을까.........ㅡ_ㅡ



본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 11. 14. 01:38, 자료]

'자료' 카테고리의 다른 글

데몬 Lite v4.30.4 32/64  (0) 2009.04.25
바탕화면  (0) 2008.10.23
HD TUNE 2.53 한글판  (0) 2008.04.27
imation usb  (2) 2008.03.29


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 11. 12. 00:50, 정보]
학교 컴퓨터 - usb를 통해서 바이러스가 감염된것 같다.

범인은 오토런 바이러스의 변종인 se520.exe 바이러스

고생하다가

한동안 지웠었던 카스퍼스키 안티 7.0 깔고 바로 해결.

바이러스에 대해 검색하다가 좋은사이트 하나 발견!

http://www.virscan.org/

'정보' 카테고리의 다른 글

프로그램 녹화 서비스 TIVIR  (0) 2008.11.28
모토로라 zn40  (0) 2008.11.27
HJE300  (0) 2008.11.11
접속 차단  (0) 2008.08.27
노턴 고스트의 모든것  (0) 2008.06.11


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 11. 11. 22:14, 정보]

베이스가 좀 강하게 울림...커널형이라 그런지
걸을때 발자국 진동과 선이 마찰될 때 진동이 선을 타고 와서 좀 거슬림..
외부잡음은 거의 안들린다는 점이 장점이 있음.

'정보' 카테고리의 다른 글

모토로라 zn40  (0) 2008.11.27
바이러스  (0) 2008.11.12
접속 차단  (0) 2008.08.27
노턴 고스트의 모든것  (0) 2008.06.11
블로그에서 키우는 위젯  (0) 2008.05.14


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 11. 8. 12:57, study/ccna]

1 Which statements are true regarding the significance of the access control list wildcard mask 0.0.0.7? (Choose two.)
• The first 29 bits of a given IP address will be ignored.
• The last 3 bits of a given IP address will be ignored.
• The first 32 bits of a given IP address will be checked.
• The first 29 bits of a given IP address will be checked.
• The last 3 bits of a given IP address will be checked.

2 Which of the following parameters can ACLs use to filter traffic? (Choose three.)
• packet size
• protocol suite
• source address
• destination address

• source router interface
• destination router interface

3 Choose the commands that will correctly configure a standard ACL. (Choose two.)
• Router(config)# access-list 97 permit host 192.5.5.1
• Router(config)# access-list 32 permit 210.93.105.3 0.0.0.0

• Router(config)# access-list 148 permit 201.100.11.2 0.0.0.0
• Router(config)# access-list 107 permit host 192.5.5.1 213.45.27.0 0.0.0.255 eq 23
• Router(config)# access-list 10 permit tcp 192.5.5.1 0.0.0.255 201.100.11.0 0.0.0.255 eq 80

4 Select the statements that describe ACL processing of packets. (Choose three.)
• An implicit deny any rejects any packet that does not match any ACL statement.
• A packet can either be rejected or forwarded as directed by the statement that is matched.

• A packet that has been denied by one statement can be permitted by a subsequent statement.
• A packet that does not match the conditions of any ACL statements will be forwarded by default.
• Each statement is checked only until a match is detected or until the end of the ACL statement list.
• Each packet is compared to the conditions of every statement in the ACL before a forwarding decision is made.

5 Which of the following are reasons to use ACLs? (Choose three.)
• to provide a basic level of security for network access
• to speed up network performance by filtering priority packets
• to preserve bandwidth by providing a mechanism for traffic flow control
• to decide which packets are forwarded or blocked at the router console port
• to screen certain hosts to either allow or deny access to part of a network
• to allow all packets passing through the router access to all parts of the network

6

Assuming the ACL in the graphic is correctly applied to an interface, what effect will the ACL have on network traffic?
• All traffic to network 172.16.0.0 will be denied.
• All TCP traffic will be permitted to and from network 172.16.0.0.
• All telnet traffic from the 172.16.0.0 network to any destination will be denied.
• All port 23 traffic to the 172.16.0.0 network will be denied.
• All traffic from the 172.16.0.0 network will be denied to any other network.

7 Choose the command that will correctly configure a standard ACL.
• Router# access-list 10 permit any
• Router# access-list 101 permit any
• Router(config)# access-list 10 permit any
• Router(config)# access-list 101 permit any
• Router(config)# access-list 10 permit any any


8

Select the commands that will apply the ACL in the diagram to filter traffic going to the 192.168.2.0 network.


• Router1# configure terminal
Router1(config)# access-list 10 in E0

• outer1(config)# interface ethernet 0
Router1(config-if)# access-list 10 in

• Router2(config)# interface s1
Router2(config-if)# ip access-group 10 out

• Router2(config)# interface ethernet 0
Router2(config-if)# ip access-group 10 out


• Router1(config)# interface ethernet 0
Router1(config-if)# ip access-group 10 out

• Router2# configure terminal
Router2(config)# access-group 10 out

9

Assuming the ACL in the graphic is correctly applied to an interface, what effect will this ACL have on network traffic?
• Host 192.168.15.4 will be denied ftp access to any destination, but will be permitted all other access.
• All ftp traffic to host 192.168.15.4 will be denied.
• All traffic from that interface will be denied.
• No traffic will be denied because a "permit" statement does not exist in this ACL.

10

Refer to the exhibit. The network administrator has connectivity to the routers and networks in the diagram. An ACL has been created to allow the network administrator FTP access to the webserver. This ACL must also deny FTP access to the server from the rest of the hosts on the LAN. Which interface in the exhibit is the recommended location to apply the ACL?
• FastEthernet 0/0 on the Carlisle router
• Serial 0/0 on the Carlisle router
• Serial 0/1 on the Mt. Holly router
• FastEthernet 0/0 on the Mt. Holly router

11 Select the correct statements about extended ACLs. (Choose two)
• Extended ACLs use a number range from 1-99.
• Extended ACLs end with an implicit permit statement.
• Extended ACLs evaluate the source and destination addresses.
• Port numbers can be used to add greater definition to an ACL.

• Multiple ACLs can be placed on the same interface as long as they are in the same direction.

12 The following commands were entered on a router:


Router(config)# access-list 2 deny 172.16.5.24
Router(config)# access-list 2 permit any


What can be concluded about this set of commands?
• The access list statements are misconfigured.
• All nodes on 172.16.0.0 will be denied access when these statements are applied.
• The default wildcard mask, 0.0.0.0 is assumed.
• The default wildcard mask 255.255.255.255 is assumed.

13 Where should a standard access control list be placed?
• close to the source
• close to the destination
• on an Ethernet port
• on a serial port

14 A router that has two Ethernet interfaces and one serial interface is configured to route both IP and IPX. What is the maximum number of IP ACLs that can be configured to filter packets on this router?
• 1
• 2
• 3
• 6
• 12


15 Which statement is true regarding wildcard masks?
• The wildcard mask and subnet mask perform the same function.
• The wildcard mask is always the inverse of the subnet mask.
• A "0" in the wildcard mask identifies IP address bits that must be checked.
• A "1" in the wildcard mask identifies a network or subnet bit.

16 ACL statements operate in sequential, logical order. If a condition match is true, the rest of the ACL statements are not checked. If all of the ACL statements are unmatched, what happens to the packet?
• The packets will be placed in a buffer and forwarded when the ACL is removed.
• The packets will be sent to the source with an error notification message.
• The implicit permit any statement placed at the end of the list will allow the packets to flow through uninhibited.
• The implicit deny any statement placed at the end of the list will cause the packets to be dropped.


17 Which of the following matches an ACL identification number with the correct protocol?(Choose three.)
• 0 - standard IP
• 99 - standard IP
• 100 - extended IP

• 210 - extended IP
• 678 - extended IPX
• 888 - standard IPX

18 The router IOS tests each condition statement in an ACL in sequence. Once a match is made, which of the following occurs? (Choose two.)
• The entire ACL must be deleted and recreated.
• The accept or reject action is performed.
• The packet is forwarded to the next hop.
• The remaining ACL statements are not checked.
• The router goes through the list again to verify that a match has been made.

19

Create a standard ACL that will deny traffic from 192.5.5.25 to the 210.93.105.0 network but will allow traffic from all other hosts. (Choose two.)

• Router(config)# access-list 22 deny 192.5.5.25 0.0.0.0

• Router(config)# access-list 22 deny host 192.5.5.25 0.0.0.0
Router(config)# access-list 22 permit any any

• Router(config)# access-list 22 deny 192.5.5.25 0.0.0.0
Router(config)# access-list 22 permit any


• Router(config)# access-list 22 deny host 192.5.5.25
Router(config)# access-list 22 permit any


• Router(config)# access-list 22 deny 192.5.5.0 0.0.0.255
Router(config)# access-list 22 permit any

'study > ccna' 카테고리의 다른 글

ccna 2 final  (0) 2008.11.22
CCNA 2 - Module 10 Exam  (0) 2008.10.28
CCNA 2 - Module 9 Exam  (0) 2008.10.28
CCNA 2 - Module 8 Exam  (0) 2008.10.25
CCNA 2 - Module 7 Exam  (0) 2008.10.25


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 10. 31. 16:43, 취미생활/game]
=================================
레드 얼럿 3 한글 개선 패치 알파 1.03V
=================================

적용방법 : 레드얼럿3가 인스톨된 폴더의 data 폴더에 복사.

원본은 백업을 권장할 가치도 못 느끼므로 그냥 덮어쓰기할 것.


[버그 수정]
*한글 개선 패치 후 메인 화면 입장이 느려지던 버그를 수정



=================================
레드 얼럿 3 한글 개선 패치 알파 1.02V
=================================

적용방법 : 레드얼럿3가 인스톨된 폴더의 data 폴더에 복사.

원본은 백업을 권장할 가치도 못 느끼므로 그냥 덮어쓰기할 것.


[동영상 자막 싱크 수정]
*오프닝
*소련 미션 1
*소련 미션 2
*소련 미션 3
*소련 미션 4


[오타 수정]
*20개 정도 단어의 오타 추가 수정


[맞춤법 수정]
*30여개 문장의 틀린 맞춤법 추가 개선


[단어 수정]
*항구 - 조선소
*기갑차량 기지 - 기갑 제조소
*평화군 - 평화유지군

[미션 제목 수정]
*얼어붙은 항구를 탈환하라 - 얼어붙은 항구 탈환



=================================
레드 얼럿 3 한글 개선 패치 알파 1.01V
=================================

[오타 수정]
*170개 정도 단어의 오타 수정


[맞춤법 수정]
*320여개 문장의 틀린 맞춤법 개선


[단어 수정]
*적색분자 - 빨갱이
*사이오닉 파멸기 - 정신력 학살기
*스커미시 - 모의전투
*장면 - 영상
*크렘린, 크레믈린, 크레물린 - 크레믈린으로 통일
*커맨드 앤 컨커 - 레드얼럿
*아레나 - 경기장
*랠리 포인트 - 집결 지점
*점프 - 도약
*크러셔 - 파쇄
*징집군 - 징집병
*국왕 - 황제
*레이다 - 레이더
*장면 - 영상
*소비에트 - 소련
*테슬라 기계보병 - 테슬라 기갑병
*플라즈마커터캐논 - 플라즈마 절단포
*타워 - 탑
*터렛 - 포탑
*소형 잠수함 - 잠수정
*어포칼립스 - 아포칼립스
*수상 - 서기장
*검은 거북 - 현무
*쿠르코브, 크루코브 - 크루코프로 통일
*엑스큐셔너 - 집행자
*축출 - 숙청
*모스코바 - 모스크바


[미션 제목 수정]
*달은 그들을 소유하지 않는다 - 달은 그들에게 넘겨주지 않는다 (The Moon Shall Never Have Them)
*광기의 유물 - 광기의 기념비 (A Monument to Madness)
*시들어에 큰 사과 - 빅 애플을 초토화시켜라 (Blight on the Big Apple)
*이스터 섬 - 석상 - 알려진 목격자??? - 돌로 된 얼굴의 목격자 (The Stone-Faced Witnesses)
*삶에 길들여진 신 - 살아있는 신을 잡아라 (To Tame a Living God)
*내일의 배반자 - 배반자 없는 내일 (No Traitors Tomorrow)
*과학의 전쟁 - 전쟁과학 (The Science of War)
*2007년 3월의 붉은 군대 - 붉은 군대의 행진 (March of the Red Army)
*얼어버린 항구 - 얼어붙은 항구를 탈환하라 (Taking Back the Ice Harbor)
*배반의 서커스 - 위험한 서커스 (Circus of Treachery)
*욱일의 공습 - 때까치와 가시나무 (The Shrike and the Thorn)

출저 : Red2.net


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 10. 28. 09:15, study/ccna]

1 Which of the following describe how TCP adds reliability to communication? (Choose three.)
• Hosts using TCP set up virtual circuits at the beginning of the transmission using the three-way handshake.
• Hosts using TCP set the error-checking frequency at the beginning of the transmission and maintain this frequency for the duration of the data transfer.
• When a sending host does not receive an acknowledgment within a timed interval it retransmits data.
• The receiving host acknowledges that it has received the expected number of segments and requests additional data.

• The receiving host acknowledges any incorrectly received data and requests retransmission of damaged or missing bytes.
• The sending host transmits each segment twice to ensure that data is not lost.


2 A computer programmer is developing software that requires a reliable stream of data. Which protocol can be used in the software design to eliminate the need for building error detection and recovery into the application program?
• TCP
• IP
• ICMP
• UDP
• HTTP


3 Why is TCP considered a connection-oriented protocol?
• It establishes a virtual connection between hosts using a two-way handshake.
• It uses IP to guarantee delivery of packets between hosts.
• It requires hosts to go through a synchronization process prior to data transmission.
• It creates a connection that depends on application layer protocols for error detection.

4 At which point in the transmission process are segments numbered?
• when received
• when reassembling
• before transmission
• while negotiating window size

5 What is dynamically assigned by the source host when forwarding data?
• destination IP address
• destination port number
• default gateway address
• source IP address
• source port number


6 How are originating source port numbers assigned during the data encapsulation process?
• assigned manually by the user when starting the application
• assigned dynamically by the source host
• assigned by the routing protocol during the lookup process
• assigned by the destination host during session negotiation


7 Which of the following would an administrator do to defend against a denial of service SYN flooding attack? (Choose two.)
• Hide the source of incoming IP addresses.
• Decrease the connection timeout period.
• Synchronize all host communication.
• Increase the connection queue size.
• Flood the network with false SYN requests.


8 When a host receives a data segment, what allows the host to determine which application should receive the segment?
• IP source address
• IP destination address
• PAR
• sliding window
• port number
• SYN packet

9 What is used by UDP to determine if the data or header has been transferred without corruption?
• lower layer protocols
• checksum
• PAR
• sliding window
• acknowledgment and retransmission
• IP

10 What is the purpose of using port numbers in the transport layer?
• to identify the segment as being either TCP or UDP
• to provide reliability during data transport
• to identify the interface port number used by the router when forwarding data
• to track multiple conversations that occur between hosts


11 In the TCP header, which of the following determines the amount of data that can be sent before receiving an acknowledgment?
• segment number
• priority number
• window size
• value in the length field
• value in the port field
• acknowledgment number

12 What does TCP use to ensure reliable delivery of data segments?
• upper layer protocols
• lower layer protocols
• sequence numbers
• port numbers


13 Which of the following protocols uses UDP for transport layer services?
• SMTP
• HTTP
• DNS
• FTP


14 What type of segment and data is shown in the graphic?
• a UDP segment carrying e-mail traffic
• a TCP segment carrying FTP traffic
• an IP segment carrying FTP traffic
• a UDP segment carrying web traffic
• a TCP segment carrying web traffic
• an IP segment carrying e-mail traffic


15 What is the purpose of Positive Acknowledgment and Retransmission (PAR)?
• PAR allows the presentation layer to request that data be resent in a format the destination host can process.
• PAR provides a mechanism for the receiving device to request that all segments be retransmitted if one segment is corrupt.
• PAR helps ensure that a number of data segments sent by one host are received by another host before additional data segments are sent.
• PAR is used to renegotiate the window size during the synchronization process.


16 Which of the following are functions of the TCP protocol? (Choose three.)
• translation of data
• synchronization
• path determination
• flow control
• data representation
• reliability


17 What is used by both TCP and UDP when creating a segment?
• IP address
• MAC address
• IPX address
• socket or port number
• acknowledgment number
• sequence number


18 Which authority has control over the assignment of port numbers for applications?
• IEEE
• IANA
• InterNIC
• Software Developers Association


19 Which of the following describe types of port numbers that can be represented in the headers of TCP and UDP segments? (Choose three.)
• connectionless
• well-known
• operational
• dynamic
• registered

• static


20 What is the purpose of the three-way handshake that occurs between hosts using TCP as the transport layer protocol?
• to increase the number of packets that can be sent before an acknowledgment is required
• to allow a host to forward data to a router
• to establish a round trip connection between sender and receiver before data is transferred
• to provide a mechanism for data encryption and compression


21 During the encapsulation process, in which order are the IP address, MAC address, and port number assigned when the router is establishing communication with the TFTP server?
• IP address, MAC address, port number
• MAC address, IP address, port number
• port number, IP address, MAC address
• port number, MAC address, IP address

22 Which of the following describes a type of denial of service attack designed to exploit the normal function of the TCP three-way handshake?
• A host sends a packet with a spoofed source IP address.
• A host sends a packet with an incorrect destination IP address.
• A source sends a packet containing a garbled header.
• A host sends an oversized packet that fills the memory buffers of the destination host.
• A host sends a packet that contains a virus.
• A host sends a packet that contains a worm.


23 Which transport layer unit of information places the port number in the header?
• data
• segment
• packet
• frame
• bit

'study > ccna' 카테고리의 다른 글

ccna 2 final  (0) 2008.11.22
CCNA 2 - Module 11 Exam  (0) 2008.11.08
CCNA 2 - Module 9 Exam  (0) 2008.10.28
CCNA 2 - Module 8 Exam  (0) 2008.10.25
CCNA 2 - Module 7 Exam  (0) 2008.10.25


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 10. 28. 09:11, study/ccna]

1

After issuing the command traceroute 192.168.4.2 from Router A, the following information is returned

Tracing the route to Router_D (192.168.4.2)
1 Router_B (192.168.2.2) 16 msec 16 msec 16 msec
2 * * *
3 * * *

What can be concluded about the network shown in the graphic based on the output given?
• Network 192.168.5.0 is missing from the routing table on Router
• There is a problem with the connection between Router B and Router C.
• Router C is not running CDP.
• Some of the routers are non-Cisco devices.
• Router B was not able to return ICMP TEMs to Router A

2 Which of the following would be the default administrative distance of a static IP route that references the IP address of the next hop?
• 0
• 1
• 5
• 20

3 After issuing the show interfaces command, a technician notices the line "Serial1 is down, line protocol is down" in the output. Which of the following are possible reasons for this message output? (Choose three.)
• There is a mismatch in the encapsulation type on both ends of the link.
• A Layer 1 issue exists.
• An interface problem exists.

• The clockrate was not set during configuration.
• There is no usable media for the protocol.
• Keepalive messages are not being sent.

4 Which three correctly pair a routing metric with its description? (Choose three.)
• hop count - the number of routers traversed to reach a destination
• bandwidth - the amount of time it takes a packet to travel a link
• load - the amount of activity on a link
• delay - the link speed
• reliability - the error rate on a link

5

When issuing the show interfaces serial1 command, a network administrator receives the output shown in the graphic. What are the possible causes of an increase in the number of input errors? (Choose three.)
• There could be Layer 3 addressing problems.
• There could be a problem with faulty telephone equipment.
• The router hardware could be defective.

• There is an incorrectly configured encapsulation on the interface.
• There could be a problem with the cabling.

6 Which ICMP message type notifies source hosts that a receiving host or network is not available?
• time exceeded
• redirect
• destination unreachable
• source quench
• parameter problem
• echo reply

7 The show interfaces command provides line and protocol status information. Which of the following conditions would never occur in the output of this command?
• serial1 is up, line protocol is up
• serial1 is up, line protocol is down
• serial1 is down, line protocol is down
• serial1 is down, line protocol is up
• serial1 is administratively down, line protocol is down

8

The network administrator shown in the exhibit can ping the E0 interface of the HAR router, but the telnet intranet.xyz.com command issued from the administrator's workstation fails to open a session with the intranet.xyz.com server. What are two possible causes of this problem? (Choose two.)
• upper-layer application problems
• domain name system problems

• IP addressing problems on the HAR router
• clock rate problems on the HAR router serial interface
• ICMP connectivity problems

9 The network administrator is using a PC to access a router via the router console port. Both the PC and the router are powered on and a cable has been connected between them. However, a session cannot be established. Which steps might fix this problem? (Choose two.)
• Verify the cable is properly connected at each end.
• Reseat the network card in the PC.
• Verify the cable is the correct type.
• Verify that a password has been set on the console line.
• Check the transceiver for link lights.
• Reseat the console card on the router

10 Which command will display routing table information about all known networks and subnetworks?
• Router# show ip interfaces
• Router# show ip connections
• Router# show ip route
• Router# show ip networks

11 A network technician has discovered that a router in the network can no longer be reached. The technician attempts to verify Layer 1 functionality, but is unable to physically inspect the cables. Which command can be used to determine the type of cable connected to the router?
• Router# show interfaces
• Router# show controllers serial
• Router# show ip route
• Router# show ip protocol
• Router# show version
• Router# show running-config

12 During the lookup process when forwarding a packet, a router checks its routing table for the best path to the destination. If a route has an administrative distance of 0, what does this indicate to the router?
• The packet should be discarded.
• The destination is unreachable.
• The destination is a directly connected network.
• The source of the update for that route is unreliable.

13 Which command will verify the functionality of all seven layers of the OSI model on a network host?
• ping
• debug
• telnet
• traceroute

14

After issuing the show interfaces serial1 command, an administrator notices an increasing number of carrier transitions. What are the possible causes for this increase? (Choose two.)
•There is an incorrect encapsulation configured on the interface.
•There could be an interruption in the line by the service provider.
•There is a faulty switch or CSU/DSU.

•There is noise on the serial line.

15

Consider the RIP network shown in the diagram. Which entries would be listed in the routing table of Router A?
• R 192.168.5.2[120/1] via 192.168.15.0, 00:00:09, Serial0
• R 192.168.15.0[120/1] via 192.168.5.2, 00:00:13, Serial1
• R 192.168.15.0[120/1] via 192.168.5.1, 00:00:13, Serial0
• R 192.168.5.1 [120/1] via 192.168.5.2 00:00:29, Serial1
R 192.168.15.0 [120/1] via 192.168.5.2, 00:00:29, Serial1
• R 192.168.5.1 [120/1] via 192.168.5.2 00:00:18, Serial0
R 192.168.15.2 [120/1] via 192.168.5.2, 00:00:18, Serial

16 Which items would be displayed when the show ip protocols command is executed? (Choose three.)
• sources of routing updates
• networks being advertised

• routing protocol up or down
• configured routed protocols
• Layer 2 status of the interface
• update timer values

17 Which two are true regarding the debug commands? (Choose two.)
• Debug commands may be issued from the user EXEC prompt.
• The command undebug all will turn off all debug operations.
• By default, the router sends the debug output and messages to the telnet session.
• The high processor overhead incurred using debug may disrupt normal router operation.
• The debug all command provides a summary view of router activity and can be used frequently for troubleshooting.
• The show debugging command will display current events such as traffic on an interface and error messages generated by nodes on the network.

18 A network administrator suspects that a network is not being included in the routing updates. Which command will provide information on when the next update is due and which networks are advertised in the update?
• Router# show interfaces
• Router# show controllers serial
• Router# show ip protocols
• Router# show ip route
• Router# show running-config

19 Which of the following is a problem at the physical layer of the OSI model?
• incorrect file formatting
• incorrect encapsulation on a serial interface
• incorrect routing protocol
• incorrect cable type

20

When the show cdp neighbors command is issued from Router C, which devices will be displayed in the output?
• D, SWH-2
• A, B, D
• SWH-1, SWH-2
• B, D
• SWH-1, A, B
• A, B, D, SWH-1, SWH-2

21 Which of the following are advantages of using a static route? (Choose three.)
• secure operation
• highly adaptable
• low maintenance configuration
• low processor overhead
• precise control of path selection


22 Which of the following commands can be used to statically configure default routes? (Choose two.)
• ip static-route
• ip route
• ip network-route
• ip default-network
• ip default-static

23 Why does a router build a routing table? (Choose two.)
• to list available routes for forwarding data
• to map local Layer 2 addresses to the remote Layer 3 destination address
• to dynamically send periodic updates regarding the router's status
• to prevent routing loops when redundant links are added to the network
• to select the best path to a destination

24 Which of the following lines from the show interfaces output would indicate a Layer 2 problem?
• Serial1 is up, line protocol is up.
• Serial1 is up, line protocol is down.
• Serial1 is down, line protocol is down.
• Serial1 is administratively down, line protocol is down.

'study > ccna' 카테고리의 다른 글

CCNA 2 - Module 11 Exam  (0) 2008.11.08
CCNA 2 - Module 10 Exam  (0) 2008.10.28
CCNA 2 - Module 8 Exam  (0) 2008.10.25
CCNA 2 - Module 7 Exam  (0) 2008.10.25
CCNA 2 - Module 7 Exam  (0) 2008.10.11


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 10. 25. 14:50, study/ccna]

1 How does a source host use ICMP to confirm that a destination host is reachable?
• The source host sends an ICMP echo request to the destination router which responds with an ICMP echo reply confirming the reachability of the destination host.
• The source host sends a data packet and receives an ICMP host unreachable packet from the destination host if the data packet cannot be delivered.
• The source host sends an ICMP packet with a TTL value of 1 and receives an ICMP reply with a TTL value of 0 from the destination host.
• The source host sends an ICMP echo request and receives an ICMP echo reply from the destination host.


2 Which type of message is generated by a host when the ping command is entered?
• ICMP echo request
• ICMP echo reply
• UDP echo request
• UDP error message

3 Which of the following start the test of destination reachability?
• echo request issued by source
• echo reply issued by source
• echo request issued by destination
• echo reply issued by destination


4 Which two statements are true regarding ICMP? (Choose two.)
• ICMP provides reliability for the TCP/IP protocol stack.
• ICMP is a component of the TCP/IP protocol stack.
• ICMP notifies the sender that data transmission errors have occurred.

• ICMP is connection-oriented.
• ICMP messages are propagated to all intermediate devices.


5 How does ICMP improve data transfer reliability in IP networks?
• Each router in the path reads ICMP packets and uses the information to update routing tables.
• ICMP can correct many network problems as they occur.
• ICMP error messages are returned to the sending device when a packet is dropped by a router.
• ICMP packets report the intermediary devices that a packet passed through before failure occurred.


6 Which layer protocols provide reliability for IP when needed?
• ICMP and ping
• RIP and TTL
• upper layer protocols
• lower layer protocols
• Internet layer protocols
• network access layer protocols


7 Which devices along a data transmission path are notified by ICMP when delivery failures occur?
• source devices only
• destination devices only
• intermediary devices
• source and destination devices
• source, intermediary, and destination devices


8 When a datagram is processed by a router on the path from source to destination, what happens to the value in the TTL field?"
• It is increased by one.
• It is decreased by one.
• It stays the same.
• It is reset to 0.
• Nothing.


9 Which condition could cause a fragmentation needed ICMP destination unreachable message to be sent?
• A low bandwidth WAN link has become congested with IP traffic.
• A packet is forwarded from a Token Ring network to an Ethernet network.
• A network is not reachable because of faulty routing information.
• The address specified by the sending host is nonexistent.


10

Workstation 1 sent a data packet to Workstation 4. It never arrived because Fa0/0 interface went down on Router C. How will the devices handle this failure?
• Workstation 4 will send an error message to Router C and Workstation 1 that it did not receive the packet.
• Router C will use ICMP to send a message back to Workstation 1 indicating that the packet could not be delivered.
• Router C discards the packet without providing notification to any device.
• Router C uses ICMP to correct the failure and transmits the data to Workstation 4.
• Workstation 1 will use ICMP to correct the problem and then notify Router C to continue the transmission.


11 Which three conditions must be met in order for host to host communication over an internetwork to occur on IP networks? (Choose three.)
• The routing protocols configured on the source and destination networks must be the same.
• A default gateway must be properly configured on the hosts and local networks.
• Intermediary devices, such as routers, must be present on the network and have knowledge of how to reach the destination network.

• The source and destination host subnet masks must match.
• The IP addresses of the hosts must be in the same network or subnet as their respective gateway devices.


'study > ccna' 카테고리의 다른 글

CCNA 2 - Module 10 Exam  (0) 2008.10.28
CCNA 2 - Module 9 Exam  (0) 2008.10.28
CCNA 2 - Module 7 Exam  (0) 2008.10.25
CCNA 2 - Module 7 Exam  (0) 2008.10.11
CCNA 2 - Module 6 Exam  (1) 2008.10.11


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 10. 25. 14:49, study/ccna]


1 Which command or set of commands will stop the RIP routing process?
• RouterB(config)# router rip
RouterB(config-router)# shutdown
• RouterB(config)# router rip
RouterB(config-router)# network no 192.168.2.0
• RouterB(config)# no router rip
• RouterB(config)# router no rip

2 When does a distance vector routing protocol set a hold-down timer on a route?
• when the metric value of the route decreases
• when the route is marked as inaccessible
• when the metric value for the route improves
• when a regular update is received from a neighboring router


3 Which of the following functions are performed by a router as routing information travels through the network? (Choose two.)
• advertise supported applications
• identify new destinations
• calculate packet speed
• verify network scalability
• identify invalid networks


4 What do distance vector algorithms require each router in the network to send?
• a partial routing table to each router in the LAN
• a partial routing table to each router in the WAN
• the entire routing table to each neighboring router
• the entire routing table to each router in the autonomous system

5

What actions will occur after RouterA loses connectivity to network 114.125.16.0? (Choose two.)
• RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterA.
• During the next update interval, RouterB will send a RIP update out both ports that includes the inaccessible network.
• During the next update interval, RouterC will send an update to RouterB stating that network 114.125.16.0 is accessible in 2 hops.
• Router C will learn of the loss of connectivity to network 114.125.16.0 from RouterB.
• RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterC.


6

Refer to the exhibit. Assuming default settings are configured, which routing protocol has been configured on the router?
• OSPF
• RIP
• EIGRP
• BGP
• Static


7 Which command will display RIP activity as it occurs on a router?
• debug ip rip
• show ip route
• show ip interface
• show ip protocols
• debug ip rip config
• show ip rip database

8 Which of the following methods does split horizon use to reduce incorrect routing information?
• Routing updates are split in half to reduce the update time.
• Information learned from one source is not distributed back to that source.
• New route information must be learned from multiple sources to be accepted.
• The time between updates is split in half to speed convergence.
• New route information is suppressed until the system has converged.


9

According to the router output from the show ip route command shown above, which of the following statements are true? (Choose two.)
• The metric to network 192.168.8.0 is 24.
• The hop count to a device on network 192.168.8.0 is 2.
• The total path cost to network 192.168.4.0 is the default value of 16.
• The logical address of the next router for network 192.168.1.0 is 192.168.3.1.
• The devices on network 192.168.5.0 cannot be reached as indicated by the 'C' label.


10 How would an administrator configure a static route for use if a primary route failed?
• configure the route with a metric greater than the default value
• configure the route and the router will activate it as needed
• configure the route to activate by using the redistribute static command
• configure the route with an administrative distance greater than the default value


11 Which statements describe RIP? (Choose three.)
• The maximum metric value is 255 hops.
• The maximum metric value is 15 hops.
• Routing updates occur every 30 seconds.
• Routing updates occur every 90 seconds.
• It is a distance vector routing protocol.
• It is a link state routing protocol.


12 A router has routes to several subnets of a classful network in its routing table. A default route is defined on the router but the ip classless command is disabled. If the router receives packets for a subnet that is not in its routing table but is in the same classful network as the other subnets, what will happen to the packets?
• The packets will be forwarded using the default route.
• The packets will be forwarded using a route to one of the other subnets of the classful network.
• A nonreachable message will be returned to the source.
• The packets will be discarded.
• The router will generate a new route to the subnetted network.


13

The administrator of the network depicted in the graphic would like to decrease the network's convergence time. How can this be accomplished?
• disable split horizon on the routers
• increase the update interval on the routers
• change the RIP holddown timer to 96 seconds
• change the RIP holddown timer to 226 seconds

14

If the passive interface command is enabled on the fa0/0 interface of Router E, which statements are true? (Choose two.)
• Router E will send all routing updates via interface fa0/0.
• Router E will ignore all routing updates learned via interface fa0/0.
• Router E will use routing updates learned via interface fa0/0.
• Router E will not send routing updates via interface fa0/0.


15 Which statements describe load balancing when RIP is configured as the routing protocol? (Choose two.)
• A router is allowed to take advantage of multiple best paths to a given destination.
• RIP uses the round robin approach in load balancing.
• RIP load balancing selects a single path to forward all data to the destination even though equal parallel paths exist.
• RIP load balancing is based on bandwidth first and then the hop count.
• Only one path to a destination can be statically assigned or dynamically calculated.


16

The graphic shows a network that is configured to use RIP routing protocol. Router2 detects that the link to Router1 has gone down. It then advertises the network for this link with a hop count metric of 16. Which routing loop prevention mechanism is in effect?
• split horizon
• error condition
• hold-down timer
• route poisoning
• count to infinity

17

Which of the following would be the correct command sequence to enable RIP on Router B for all connected networks?
• RouterB# router rip
RouterB(router)# network 210.36.7.0
RouterB(router)# network 220.17.29.0
RouterB(router)# network 211.168.74.0

• RouterB(config)# router rip
RouterB(config-router)# network 198.16.4.0
RouterB(config-router)# network 211.168.74.0
RouterB(config-router)# network 199.84.32.0

• RouterB(config)# configure router rip
RouterB(config-router)# network 210.36.7.0
RouterB(config-router)# network 199.84.32.0
RouterB(config-router)# network 211.168.74.0


• RouterB(config)# router rip
RouterB(config-router)# network 198.16.4.0
RouterB(config-router)# network 210.36.7.0
RouterB(config-router)# network 211.168.74.0


• RouterB(config)# router rip
RouterB(config-router)# network 198.16.4.0
RouterB(config-router)# network 210.36.7.0
RouterB(config-router)# network 220.17.29.0


18 When a routing table update is received by a router in a distance vector network, which of the following occurs?
• The hop count metrics for the enclosed routes are incremented.
• The update is forwarded to the gateway router for verification.
• Path entries are checked for routing loops.
• The hop count metrics for the enclosed routes are decremented.
• Static routes are updated with the new information.

19 The following line was displayed in the output of the show ip route command:
192.168.3.0/24 [120/2] via 192.168.2.2, 00:00:30, Serial0/0
What is the administrative distance of the enabled routing protocol?
• 2
• 30
• 100
• 120


20 When does RIP send routing table updates? (Choose two.)
• periodically, every 30 seconds
• periodically, every 60 seconds
• periodically, every 90 seconds
• if optionally configured, when topology changes occur (triggered-update)


21 Which of the following can exist in a distance vector network that has not converged? (Choose three.)
• routing loops
• inconsistent traffic forwarding

• no traffic forwarding until system converges
• inconsistent routing table entries
• routing table updates sent to wrong destinations


22 What happens to a static route entry in a routing table when the outgoing interface is not available?
• The route is removed from the table.
• The router polls neighbors for a replacement route.
• The route remains in the table because it was defined as static.
• The router redirects the static route to compensate for the loss of the next hop device.


'study > ccna' 카테고리의 다른 글

CCNA 2 - Module 10 Exam  (0) 2008.10.28
CCNA 2 - Module 9 Exam  (0) 2008.10.28
CCNA 2 - Module 8 Exam  (0) 2008.10.25
CCNA 2 - Module 7 Exam  (0) 2008.10.11
CCNA 2 - Module 6 Exam  (1) 2008.10.11


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 10. 23. 23:44, 자료]
사용자 삽입 이미지
사용자 삽입 이미지
사용자 삽입 이미지
현재 쓰는 거..

'자료' 카테고리의 다른 글

데몬 Lite v4.30.4 32/64  (0) 2009.04.25
윈도우XP 임베디드테마  (0) 2008.11.14
HD TUNE 2.53 한글판  (0) 2008.04.27
imation usb  (2) 2008.03.29


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 10. 11. 13:15, study/ccna]

1 Which command or set of commands will stop the RIP routing process?
• RouterB(config)# router rip
RouterB(config-router)# shutdown
• RouterB(config)# router rip
RouterB(config-router)# network no 192.168.2.0
• RouterB(config)# no router rip
• RouterB(config)# router no rip

2 When does a distance vector routing protocol set a hold-down timer on a route?
• when the metric value of the route decreases
• when the route is marked as inaccessible
• when the metric value for the route improves
• when a regular update is received from a neighboring router


3 Which of the following functions are performed by a router as routing information travels through the network? (Choose two.)
• advertise supported applications
• identify new destinations
• calculate packet speed
• verify network scalability
• identify invalid networks


4 What do distance vector algorithms require each router in the network to send?
• a partial routing table to each router in the LAN
• a partial routing table to each router in the WAN
• the entire routing table to each neighboring router
• the entire routing table to each router in the autonomous system

5

What actions will occur after RouterA loses connectivity to network 114.125.16.0? (Choose two.)
• RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterA.
• During the next update interval, RouterB will send a RIP update out both ports that includes the inaccessible network.
• During the next update interval, RouterC will send an update to RouterB stating that network 114.125.16.0 is accessible in 2 hops.
• Router C will learn of the loss of connectivity to network 114.125.16.0 from RouterB.
• RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterC.


6

Refer to the exhibit. Assuming default settings are configured, which routing protocol has been configured on the router?
• OSPF
• RIP
• EIGRP
• BGP
• Static


7 Which command will display RIP activity as it occurs on a router?
• debug ip rip
• show ip route
• show ip interface
• show ip protocols
• debug ip rip config
• show ip rip database

8 Which of the following methods does split horizon use to reduce incorrect routing information?
• Routing updates are split in half to reduce the update time.
• Information learned from one source is not distributed back to that source.
• New route information must be learned from multiple sources to be accepted.
• The time between updates is split in half to speed convergence.
• New route information is suppressed until the system has converged.


9

According to the router output from the show ip route command shown above, which of the following statements are true? (Choose two.)
• The metric to network 192.168.8.0 is 24.
• The hop count to a device on network 192.168.8.0 is 2.
• The total path cost to network 192.168.4.0 is the default value of 16.
• The logical address of the next router for network 192.168.1.0 is 192.168.3.1.
• The devices on network 192.168.5.0 cannot be reached as indicated by the 'C' label.


10 How would an administrator configure a static route for use if a primary route failed?
• configure the route with a metric greater than the default value
• configure the route and the router will activate it as needed
• configure the route to activate by using the redistribute static command
• configure the route with an administrative distance greater than the default value


11 Which statements describe RIP? (Choose three.)
• The maximum metric value is 255 hops.
• The maximum metric value is 15 hops.
• Routing updates occur every 30 seconds.
• Routing updates occur every 90 seconds.
• It is a distance vector routing protocol.
• It is a link state routing protocol.


12 A router has routes to several subnets of a classful network in its routing table. A default route is defined on the router but the ip classless command is disabled. If the router receives packets for a subnet that is not in its routing table but is in the same classful network as the other subnets, what will happen to the packets?
• The packets will be forwarded using the default route.
• The packets will be forwarded using a route to one of the other subnets of the classful network.
• A nonreachable message will be returned to the source.
• The packets will be discarded.
• The router will generate a new route to the subnetted network.


13

The administrator of the network depicted in the graphic would like to decrease the network's convergence time. How can this be accomplished?
• disable split horizon on the routers
• increase the update interval on the routers
• change the RIP holddown timer to 96 seconds
• change the RIP holddown timer to 226 seconds

14

If the passive interface command is enabled on the fa0/0 interface of Router E, which statements are true? (Choose two.)
• Router E will send all routing updates via interface fa0/0.
• Router E will ignore all routing updates learned via interface fa0/0.
• Router E will use routing updates learned via interface fa0/0.
• Router E will not send routing updates via interface fa0/0.


15 Which statements describe load balancing when RIP is configured as the routing protocol? (Choose two.)
• A router is allowed to take advantage of multiple best paths to a given destination.
• RIP uses the round robin approach in load balancing.
• RIP load balancing selects a single path to forward all data to the destination even though equal parallel paths exist.
• RIP load balancing is based on bandwidth first and then the hop count.
• Only one path to a destination can be statically assigned or dynamically calculated.


16

The graphic shows a network that is configured to use RIP routing protocol. Router2 detects that the link to Router1 has gone down. It then advertises the network for this link with a hop count metric of 16. Which routing loop prevention mechanism is in effect?
• split horizon
• error condition
• hold-down timer
• route poisoning
• count to infinity

17

Which of the following would be the correct command sequence to enable RIP on Router B for all connected networks?
• RouterB# router rip
RouterB(router)# network 210.36.7.0
RouterB(router)# network 220.17.29.0
RouterB(router)# network 211.168.74.0

• RouterB(config)# router rip
RouterB(config-router)# network 198.16.4.0
RouterB(config-router)# network 211.168.74.0
RouterB(config-router)# network 199.84.32.0

• RouterB(config)# configure router rip
RouterB(config-router)# network 210.36.7.0
RouterB(config-router)# network 199.84.32.0
RouterB(config-router)# network 211.168.74.0


• RouterB(config)# router rip
RouterB(config-router)# network 198.16.4.0
RouterB(config-router)# network 210.36.7.0
RouterB(config-router)# network 211.168.74.0


• RouterB(config)# router rip
RouterB(config-router)# network 198.16.4.0
RouterB(config-router)# network 210.36.7.0
RouterB(config-router)# network 220.17.29.0


18 When a routing table update is received by a router in a distance vector network, which of the following occurs?
• The hop count metrics for the enclosed routes are incremented.
• The update is forwarded to the gateway router for verification.
• Path entries are checked for routing loops.
• The hop count metrics for the enclosed routes are decremented.
• Static routes are updated with the new information.

19 The following line was displayed in the output of the show ip route command:
192.168.3.0/24 [120/2] via 192.168.2.2, 00:00:30, Serial0/0
What is the administrative distance of the enabled routing protocol?
• 2
• 30
• 100
• 120


20 When does RIP send routing table updates? (Choose two.)
• periodically, every 30 seconds
• periodically, every 60 seconds
• periodically, every 90 seconds
• if optionally configured, when topology changes occur (triggered-update)


21 Which of the following can exist in a distance vector network that has not converged? (Choose three.)
• routing loops
• inconsistent traffic forwarding

• no traffic forwarding until system converges
• inconsistent routing table entries
• routing table updates sent to wrong destinations


22 What happens to a static route entry in a routing table when the outgoing interface is not available?
• The route is removed from the table.
• The router polls neighbors for a replacement route.
• The route remains in the table because it was defined as static.
• The router redirects the static route to compensate for the loss of the next hop device.

'study > ccna' 카테고리의 다른 글

CCNA 2 - Module 10 Exam  (0) 2008.10.28
CCNA 2 - Module 9 Exam  (0) 2008.10.28
CCNA 2 - Module 8 Exam  (0) 2008.10.25
CCNA 2 - Module 7 Exam  (0) 2008.10.25
CCNA 2 - Module 6 Exam  (1) 2008.10.11


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 10. 11. 13:13, study/ccna]

1 What can be concluded about the routing process on a router if the commands router rip and network 192.5.5.0 have been issued? (Choose three.)
• A distance vector routing protocol was used.
• A link-state routing protocol was used.
• Routing updates will broadcast every 30 seconds.
• Routing updates will broadcast every 90 seconds.
• Hop count is the metric used for route selection.
• Bandwidth, load, delay, and reliability are the metrics used for route selection.


2 Which two protocols use an addressing scheme to direct user traffic? (Choose two.)
• IP
• EIGRP
• IPX
• OSPF
• RIP

3 What are some of the advantages of using a link-state routing protocol instead of a distance vector routing protocol? (Choose two.)
• The topology database eliminates the need for a routing table.
• Frequent periodic updates are sent to minimize the number of incorrect routes in the topological database.
• Routers have direct knowledge of all links in the network and how they are connected.
• After the inital LSA flooding, they generally require less bandwidth to communicate changes in a topology.

• Link-state protocols require less router processor power than distance vector protocols.

4 If dynamic routing is not configured on a router, how do routing table updates occur?
• Link state advertisements are sent from other routers.
• Updates are made to the routing table by the administrator.
• Best path information is communicated by network hosts.
• The routing table is updated by neighboring routers.

5 Why is fast convergence desirable in networks that use dynamic routing protocols?
• Routers will not allow packets to be forwarded until the network has converged.
• Hosts are unable to access their gateway until the network has converged.
• Routers may make incorrect forwarding decisions until the network has converged.
• Routers will not allow configuration changes to be made until the network has converged.


6 What is the purpose of a routing protocol?
• It is used to build and maintain ARP tables.
• It provides a method for segmenting and reassembling data packets.
• It allows an administrator to devise an addressing scheme for the network.
• It allows a router to share information about known networks with other routers.
• It provides a procedure for encoding and decoding data into bits for packet forwarding.

7 Which are the primary functions used by a router when forwarding data?(Choose two.)
• data encryption
• error notification
• packet switching
• address identification
• path determination
• packet validation


8 How does a router learn about routes to a network? (Choose three.)
• Information is gathered from its own configuration regarding directly connected networks.
• Switches forward destination address information to each router.
• Hosts communicate destination network information to each router.
• Other routers forward information about known networks.
• Routes are entered manually by a network administrator.

• Routes are learned from information gathered from ARP tables.


9 Which type of address does a router use to make routing decisions?
• source IP address
• source MAC address
• destination IP address
• destination MAC address

10 Describe the switching function that occurs in a router.
• allows the router to make forwarding decisions based on Layer 2 addressing
• uses network addressing to select the best route and interface to forward data
• accepts a packet on one interface and forwards it to a second interface
• enables the router to select the most appropriate interface for forwarding a packet


11 Select the statements that describe link-state routing processes? (Choose three.)
• Each router develops its own map of the entire network.
• Routers send triggered updates when changes in the network occur.
• Link-state routing protocols place a higher load on router resources during the routing protocol initialization.

• Link-state protocols are more prone to routing loops than distance vector routing protocols.
• Networks using link-state routing protocols are slower to reach convergence after changes have occurred than those using distance vector protocols.


12 Why is it necessary to specify a list of networks when configuring an interior routing protocol?
• to tell the router how to reach those networks
• to tell the router which attached networks participate in routing updates
• to tell the router which set of metrics to use for the attached networks
• to tell the router which routing protocol to use


13

Assuming that the network shown in the graphic is converged and dynamic routing is enabled, which of the following conditions will cause a modification to the Orlando routing table? (Choose two.)
• The device connecting the S0 interface of the Tampa router to the serial link loses power.
• A network administrator shuts down the Orlando router E0 interface.
• A DCHP server connected to the Tampa E1 network loses power.
• The IP address of a workstation on the Orlando E0 network is reassigned.
• A host on the Orlando E1 network transmits data to a server on the Tampa E1 network.
• A Telnet connection to the Orlando router fails.

14 All routers at a medium sized company have been upgraded. During the upgrade, the network administrator determined that a more advanced routing protocol using a combination of both distance vector and link state features should be implemented. Which protocol should be selected?
• RIP
• BGP
• OSPF
• EIGRP


15 Which category of routing algorithms discovers and maintains a topological map of the entire internetwork?
• static
• Bellman-Ford
• exterior gateway
• Internetwork Packet Exchange
• distance vector
• link-state

16 Which is an exterior routing protocol commonly used between ISPs?
• RIP
• BGP
• OSPF
• EIGRP


17 Which of the following statements are true regarding the command ip route 172.16.1.0 255.255.255.0 172.16.2.1? (Choose three.)
• This command is used to set up a static route.
• This command is used to set up a default route.
• This command is entered from global configuration mode.
• All packets intended for network 172.16.1.0 will be sent to gateway 172.16.2.1.

• All packets intended for network 172.16.2.1 will be sent to gateway 172.16.1.0.


18

Referring to the diagram, which commands will enable hosts on the Idaho E0 network to reach hosts on the E0 network of the Montana router? (Choose two.)
• Montana(config)# ip route 172.31.5.0 255.255.255.0 172.31.5.1
• Montana(config)# ip route 172.31.3.0 255.255.255.0 172.31.4.1
• Idaho(config)# ip route 172.31.5.0 255.255.255.0 172.31.4.1
• Idaho(config)# ip route 172.31.5.0 255.255.255.0 172.31.4.2
• Idaho(config)# ip route 172.31.5.1 255.255.255.0 172.31.4.1

19

Which of the following are valid static IP routes? (Choose three.)
• RouterB(config)# ip route 192.168.5.0 255.255.255.0 S1
• RouterC(config)# ip route 192.168.1.0 255.255.255.0 S1
• RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.2.2
• RouterB(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.2
• RouterC(config)# ip route 192.168.2.0 255.255.255.0 192.168.4.1
• RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.2.1


20 Given the command, RouterC(config)# ip route 197.5.2.0 255.255.255.0 192.10.1.1, what does the address 192.10.1.1 represent?
• the source host
• the next hop router
• the outbound interface
• the destination network


21 Which of the following conditions must be met in order for a network to have converged?
• The routers in the network are operating with dynamic routing protocols.
• The routers in the network are operating with compatible versions of IOS.
• The routers in the network are operating with the same routing tables.
• The routers in the network are operating with consistent routing knowledge.

22 Which two statements describe autonomous systems? (Choose two.)
• Interior gateway protocols are used between autonomous systems.
• Exterior gateway protocols are used between autonomous systems.
• An autonomous system may be under the control of multiple organizations.
• An autonomous system is identified by a 16 bit number assigned by ARIN.
• The autonomous system is identified in the network portion of the IP address.

'study > ccna' 카테고리의 다른 글

CCNA 2 - Module 10 Exam  (0) 2008.10.28
CCNA 2 - Module 9 Exam  (0) 2008.10.28
CCNA 2 - Module 8 Exam  (0) 2008.10.25
CCNA 2 - Module 7 Exam  (0) 2008.10.25
CCNA 2 - Module 7 Exam  (0) 2008.10.11


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 9. 19. 10:51, 취미생활/music]

'취미생활 > music' 카테고리의 다른 글

lazy days - 로비윌리엄스  (0) 2009.03.07
scar tissue - rhcp  (0) 2009.03.07
레드핫칠리페퍼스 일시 해체  (0) 2008.05.25
World Peace Now Live Concert 2008  (0) 2008.04.14
Salah Vs Jsmooth @ UK bboy championships 06/07  (0) 2008.01.18


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 9. 15. 05:04, 취미생활/movie]


청주 날씨는 어때요?

예 좋아요~ㅋㅋ



내가 괜찮은 친구를 엮었는데요, 나를 굉장히 싫어해요.

'취미생활 > movie' 카테고리의 다른 글

The Good, the Bad, and the Slimy: 20 Great Movie Creatures  (0) 2008.05.25
구타유발자들  (0) 2008.01.09
야후가 선정한 2008년도 기대작 10편  (0) 2008.01.01
영화 콘택트  (1) 2007.08.23
비포선라이즈 -1995-  (0) 2007.08.22


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 8. 27. 00:12, 정보]
자주 애용하던 외국의 웹하드(http://www.esnips.com/) 사이트가 몇 달 전부터
접속이 안되더니 오늘은 방송통신심의위원회에서 지정한 불법정보사이트라고 뜬다.


하지만 들어갈수 있는 방법이 있다.
http://www.stuffunblocker.com/  이사이트를 거치면 접속이 가능하다.

'정보' 카테고리의 다른 글

바이러스  (0) 2008.11.12
HJE300  (0) 2008.11.11
노턴 고스트의 모든것  (0) 2008.06.11
블로그에서 키우는 위젯  (0) 2008.05.14
google 로고  (0) 2008.04.23


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 8. 16. 11:43, 취미생활/game]
아마 많은 분들이 리얼텍 HD오디오를 사용하실듯 하네요



1.0때는 EAX On으로 해결 가능했던 이문제가

1.1패치후 EAX OPENAL호환모드가 불가능 해짐에 따라

사운드가 나지 않는 당황스런 상황이 발생...


하루 종일 삽질후에 2K 쪽의 테크 포럼에서 답변을 찾았네요


솔루션은,

1. Realtek의 최신 드라이버를 설치합니다 (www.parkoz.co.kr의 파워 다운로드를 이용하셔도..)

2. 다이렉트엑스 최신 버전을 설치합니다 (이건 뭐 필요 없음..)



가장 중요!!!!

3. 제어판 - 소리 - 녹음탭 - 오른쪽클릭 - 사용할수없는장치표시 체크- 스테레오믹스 오른쪽클릭 - 사용함체크



한마디로 스테레오 믹스 문제였습니다 -_-

모쪼록 많은 분들이 해결 하셨음 하는 바램입니다..

아무튼 즐거운 바이오 쇼크!!!


P.S

아 덤으로 오토패치 안되는 현상 땜시 고생하시는 분들,

그거는 계정땜에 그러니까 다른 계정에서 설치하시고

모든 사용자가 플레이할수 있음 체크하심 됩니다... ^^

'취미생활 > game' 카테고리의 다른 글

GTA4 치트키  (0) 2008.12.06
레드일럿 한글 패치 개선판입니다.  (1) 2008.10.31
심시티4 치트  (0) 2008.08.12
Dragonball Z,GT,Org Sparking Meteor (pc에뮬)  (1) 2008.08.12
스타크래프트 CD 안넣고 즐기기  (0) 2008.07.04


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 8. 12. 15:29, 취미생활/game]

1.게임에 들어가서 치트를 칠 마을에 들어간다.

2.먼저 [Ctrl+x]를 친다.

3.창이 뜨면 이 중에서 골라서 치고, 엔터를 누른다.

stopwatch - 24시간 잠시멈춤/재개하기
whatimeizit - 원하는 시간으로 시간을 설정하기
whererufrom - 도시의 이름을 원하는 새로운 이름으로 바꾸기
hellomynameis - 시장의 이름을 당신이 원하는 새로운 이름으로 바꾸기
you don`t deserve it - 모든 보상금을 활성화시키기
sizeof - 화면 확대 시키기
weaknesspays - 기금에 1,000불 추가하기
fightthepower - 모든 건물의 전력 수요를 제거하기
howdryiam - 모든 건물의 수도 수요를 제거하기
zoneria - 비어있는 구역의 색깔을 숨기기
tastyzots - zots를 제거하기(zots: 도로, 전력, 수도, 일자리가 없을 때)

 



본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 8. 12. 13:15, 취미생활/game]


http://www.emulcrash.com/game_list_bbs/view.php?code=support_list_ps2&post_num=1208393247&no=180&search_list=&search_contents=


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 8. 5. 17:08, 잡담]
알바 끝나고 휴가 다녀왔다.
동사무소가 시내가 아니라 시외로 배치되서
시내배치자와 다르게 노동을 좀 했다능!!
땀이 많은 체질이라 조금 힘들긴 했다. 동사무소 안에 들어와도,
요즘 고유가시대라 청주시장님이 실내온도 28도 유지를 하라고
지시가 있었다나. 동사무소안은 29~30도--;;
더운게 힘들다...
동사무소알바는 겨울에는 편할 것이다.........ㅋㅋ
추워서 밖에서 일도 안하고 따뜻한 실내에서만 일한다 하더라 ㄲㄲ

사무장님이 해주신 말씀은 잘 새겨야지;후후..

'잡담' 카테고리의 다른 글

노무현 전 대통령 서거  (0) 2009.05.23
금연삼일째~ 졸음과의 싸움  (3) 2009.04.22
알바 끝  (0) 2008.08.01
청주 시청알바 당첨  (2) 2008.06.24
Air quotes  (0) 2008.02.28


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 8. 1. 11:29, 잡담]

동사무소 알바 마지막날.

'잡담' 카테고리의 다른 글

금연삼일째~ 졸음과의 싸움  (3) 2009.04.22
동사무소 알바  (0) 2008.08.05
청주 시청알바 당첨  (2) 2008.06.24
Air quotes  (0) 2008.02.28
아이비  (0) 2007.11.03


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 7. 4. 00:03, 취미생활/game]

이 팁을 이용(?) 하실려면 먼저 스타 버전이 1.15.2 이상이여야 합니다.



Starcraft and Brood War Patch Information

--------------------------------------------------------------------------------
- patch 1.15.2
--------------------------------------------------------------------------------

  Feature Changes

- StarCraft and StarCraft: BroodWar no longer require the CD while playing the
  game.  To play without the CD, please follow the following instructions:

- Windows Users:
    - Make sure you have "Hide extensions for known types" unchecked under
      Explorer Folder Options.
    - If you own only StarCraft, copy "INSTALL.EXE" from the StarCraft CD to
      your StarCraft folder and rename it to "StarCraft.mpq".
    - If you own StarCraft: Brood War, copy "INSTALL.EXE" from the StarCraft:
      Brood War CD to your StarCraft folder and rename it to "BroodWar.mpq".

- Mac users:
    - If you own only StarCraft, copy "StarCraft Archive" from the StarCraft CD
      to your StarCraft folder.
    - If you own StarCraft: Brood War, copy "Brood War Archive" from the
      StarCraft: Brood War CD to your StarCraft folder.


CD 의 INSTALL.EXE 파일을 스타크래프트 설치폴더에 복사하고 이름을 BroodWar.mpq로 변경

(스타 오리지날의 경우라면 StarCraft.mpq로 변경)

 

주의 : 윈도우의 경우 알려진 파일 형식의 파일 확장명의 숨기기 해제 하고 변경하시면 됩니다.



사용자 삽입 이미지

출처 : Starcraft and Brood War Patch Information


본인의 아이피 주소 확인과 위치 추적
[Schizo!, 2008. 6. 24. 21:35, 잡담]

신의 알바라는 시청 알바에 당첨되었다~!
사실 안되면 당연한거고 되면 운좋은거라고 해서
별 기대하지 않았고 안되면 토익 조낸 열심히 하는거다 이랬는데 헐  ㅡㅡ;;
1200번대라 지루하게 줄을 기다리다가 추첨을 했는데~
운이 좋게도 당첨되었다~
처음 지원하는거였는데 두번 지원한 내 친구에게는 미안 나만 되버렸네
암튼 7월7일부터 알바 시작! 이로써 규칙적인 생활을 할수 있겠군 ㄷㄷ
충북지방경찰청은 꽤 좋았는데
시청알바는 어떨까?



청주시(시장 남상우)는 대학생 아르바이트 신청자를 대상으로 방학기간 중 시청 산하에서 근무할 대학생을 선발했다.

시는 각동 주민센터를 통해 지난 6월 9일부터 18일까지 접수한 결과, 아르바이트를 신청한 인원은 총 1,509명으로 선발대상 215명에 대해 기초생활수급자, 차상위계층, 차상위의료특례자, 부모중 1인이 장애(1~4급)인 세대의 자녀 142명을 우선하여 선발하고 나머지 신청자 1,367명중 73명을 6월 24일 오후2시에 청주시민회관에서 공개 추첨을 실시하여 18대1의 치열한 경쟁률을 보였다.

이렇게 관공서 아르바이트가 높은 경쟁률을 보이는 이유는 하루 31,000원 총 24일간 74만4천원의 임금 수준이 만족스럽고 또한 비교적 안정적인 근로조건 등 대학생들이 선호하기 때문인 것으로 분석됐다.

한편 대학생 아르바이트에 선발된 학생은 청주시 산하 부서에 배치되어 7월 7일부터 8월 1일까지 근무하게 된다.

시 관계자는 “이번 아르바이트 기간중 학생들이 좋은 행정 경험을 하고 돌아가도록 만전을 기할 계획”이라고 밝혔다.

'잡담' 카테고리의 다른 글

동사무소 알바  (0) 2008.08.05
알바 끝  (0) 2008.08.01
Air quotes  (0) 2008.02.28
아이비  (0) 2007.11.03
아프간 피랍 인질 전원 석방이고 뭐고  (0) 2007.08.29


본인의 아이피 주소 확인과 위치 추적